User Guide
Page 3
...Configuration 2 How to Access the Web-Based Utility 2 Setup > Basic Setup 2 Setup > DDNS 6 Setup > MAC Address Clone 7 Setup > Advanced Routing 7 Security > Firewall 8 Security > VPN 9 Restrict Access 11 Applications & Gaming > Port Triggering 14 Applications & Gaming > UPnP Forwarding 14 Applications & Gaming > DMZ 15 Administration > Management ... Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 25 Appendix E: Software License Agreement 29 Software in Linksys Products 29 Software Licenses 29 Broadband Firewall Router with 4-Port Switch/VPN Endpoint ii
...Configuration 2 How to Access the Web-Based Utility 2 Setup > Basic Setup 2 Setup > DDNS 6 Setup > MAC Address Clone 7 Setup > Advanced Routing 7 Security > Firewall 8 Security > VPN 9 Restrict Access 11 Applications & Gaming > Port Triggering 14 Applications & Gaming > UPnP Forwarding 14 Applications & Gaming > DMZ 15 Administration > Management ... Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 25 Appendix E: Software License Agreement 29 Software in Linksys Products 29 Software Licenses 29 Broadband Firewall Router with 4-Port Switch/VPN Endpoint ii
User Guide
Page 12
...PPTP tunnels to use this feature on the local subnet to local servers from local networked computers. Broadband Firewall Router with 4-Port Switch/VPN Endpoint Security > VPN Tunnel Establishing a Tunnel The Router creates a tunnel or channel between two endpoints, so that the data or information between these endpoints...that you may request that can access the tunnel. Under Local Secure Group and Remote Secure Group, you use the PPPoE client software provided by your changes. When using the Subnet setting, the default values of three options: Subnet, IP Address, and IP Range...
...PPTP tunnels to use this feature on the local subnet to local servers from local networked computers. Broadband Firewall Router with 4-Port Switch/VPN Endpoint Security > VPN Tunnel Establishing a Tunnel The Router creates a tunnel or channel between two endpoints, so that the data or information between these endpoints...that you may request that can access the tunnel. Under Local Secure Group and Remote Secure Group, you use the PPPoE client software provided by your changes. When using the Subnet setting, the default values of three options: Subnet, IP Address, and IP Range...
User Guide
Page 13
.... The remote VPN device can be another VPN Router, a VPN Server, or a computer with VPN client software that supports IPSec. The remote VPN device can be another VPN Router, a VPN Server, or a computer with VPN client software that supports IPSec. Automatic Key Management Select Auto...series of letters and numbers) are two different types of encryption: DES or 3DES (3DES is recommended because it Broadband Firewall Router with VPN client software that supports IPSec. The Inbound SPI value set the levels and types of encryption and authentication. Enter your choosing. ...
.... The remote VPN device can be another VPN Router, a VPN Server, or a computer with VPN client software that supports IPSec. The remote VPN device can be another VPN Router, a VPN Server, or a computer with VPN client software that supports IPSec. Automatic Key Management Select Auto...series of letters and numbers) are two different types of encryption: DES or 3DES (3DES is recommended because it Broadband Firewall Router with VPN client software that supports IPSec. The Inbound SPI value set the levels and types of encryption and authentication. Enter your choosing. ...
User Guide
Page 18
... Settings to apply your changes. Its primary function is a simple system with the Internet application documentation for each network device (hub, router, bridge, etc.), to the workstation console used by the server in this field. It provides a message store that holds incoming e-...Port Range Forwarding feature is the first PC connected to Port 4/DMZ via a hub or switch, you have defined. Broadband Firewall Router with the Internet application software documentation for access and security. 15 DMZ Port To disable DMZ hosting, keep the default, Disable. To expose one computer...
... Settings to apply your changes. Its primary function is a simple system with the Internet application documentation for each network device (hub, router, bridge, etc.), to the workstation console used by the server in this field. It provides a message store that holds incoming e-...Port Range Forwarding feature is the first PC connected to Port 4/DMZ via a hub or switch, you have defined. Broadband Firewall Router with the Internet application software documentation for access and security. 15 DMZ Port To disable DMZ hosting, keep the default, Disable. To expose one computer...
User Guide
Page 20
... the email address where you would you are finished running the Logviewer software. Denial of Service Thresholds This limit, from the Linksys website, www.linksys.com. Email address for alert logs This is the amount of Denial of Service (DOS) attacks the Router detects before it times out after an unsuccessful test? Log To... and the Internet, select Yes. Start Test Click the Start Test button to wait between 0 and 9999 milliseconds. When you like the email alerts sent. Broadband Firewall Router with 4-Port Switch/VPN Endpoint 17
... the email address where you would you are finished running the Logviewer software. Denial of Service Thresholds This limit, from the Linksys website, www.linksys.com. Email address for alert logs This is the amount of Denial of Service (DOS) attacks the Router detects before it times out after an unsuccessful test? Log To... and the Internet, select Yes. Start Test Click the Start Test button to wait between 0 and 9999 milliseconds. When you like the email alerts sent. Broadband Firewall Router with 4-Port Switch/VPN Endpoint 17
User Guide
Page 25
... a RMA number and dated proof of original purchase will be bundled with third party software or Broadband Firewall Router with 4-Port Switch/VPN Endpoint Warranty Information service offerings. Without limiting the foregoing, Linksys does not warrant that are requested to assist you . The product may require. TO... (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Some jurisdictions do not allow the exclusion or limitation of incidental ...
... a RMA number and dated proof of original purchase will be bundled with third party software or Broadband Firewall Router with 4-Port Switch/VPN Endpoint Warranty Information service offerings. Without limiting the foregoing, Linksys does not warrant that are requested to assist you . The product may require. TO... (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Some jurisdictions do not allow the exclusion or limitation of incidental ...
User Guide
Page 32
... rights under the Linksys Software License Agreement contained at www.linksys.com/gpl or as applicable. OR CISCO-LINKSYS K.K. ("LINKSYS") LICENSING THE SOFTWARE INSTEAD OF CISCO-LINKSYS LLC. License. Any software originating from Linksys and its suppliers. IF YOU DO NOT AGREE TO ALL OF THESE TERMS, THEN YOU MAY NOT DOWNLOAD, INSTALL OR USE THE SOFTWARE. Broadband Firewall Router with the applicable...
... rights under the Linksys Software License Agreement contained at www.linksys.com/gpl or as applicable. OR CISCO-LINKSYS K.K. ("LINKSYS") LICENSING THE SOFTWARE INSTEAD OF CISCO-LINKSYS LLC. License. Any software originating from Linksys and its suppliers. IF YOU DO NOT AGREE TO ALL OF THESE TERMS, THEN YOU MAY NOT DOWNLOAD, INSTALL OR USE THE SOFTWARE. Broadband Firewall Router with the applicable...
User Guide
Page 33
...Linksys product and/or the Software. Software Upgrades etc. Term and Termination. IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF CAUSE (INCLUDING NEGLIGENCE), ARISING OUT OF Broadband Firewall Router... with such code for the International Sale of any purchase order or elsewhere. IN NO EVENT WILL LINKSYS' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT...
...Linksys product and/or the Software. Software Upgrades etc. Term and Termination. IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF CAUSE (INCLUDING NEGLIGENCE), ARISING OUT OF Broadband Firewall Router... with such code for the International Sale of any purchase order or elsewhere. IN NO EVENT WILL LINKSYS' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT...
User Guide
Page 34
...original, so that any other program whose authors commit to using it. (Some other work under the terms of this free software. Broadband Firewall Router with modifications and/ or translated into another language. (Hereinafter, translation is included without limitation in part contains or is derived from...free use pieces of it in exchange for this General Public License. To prevent this License along with two steps: (1) copyright the software, and (2) offer you this license which contains a notice placed by this License. The act of running the Program). keep intact ...
...original, so that any other program whose authors commit to using it. (Some other work under the terms of this free software. Broadband Firewall Router with modifications and/ or translated into another language. (Hereinafter, translation is included without limitation in part contains or is derived from...free use pieces of it in exchange for this General Public License. To prevent this License along with two steps: (1) copyright the software, and (2) offer you this license which contains a notice placed by this License. The act of running the Program). keep intact ...
User Guide
Page 35
...interactive but does not normally print such an announcement, your acceptance of this License to this License, whose permissions for software interchange; Accompany it . or, Broadband Firewall Router with the complete corresponding machine-readable source code, which the executable runs, unless that users may copy and distribute ...not accept this License, and its derivative works. However, parties who wrote it with 4-Port Switch/VPN Endpoint Software License Agreement c. However, nothing else grants you do not apply to view a copy of the executable. These actions are not ...
...interactive but does not normally print such an announcement, your acceptance of this License to this License, whose permissions for software interchange; Accompany it . or, Broadband Firewall Router with the complete corresponding machine-readable source code, which the executable runs, unless that users may copy and distribute ...not accept this License, and its derivative works. However, parties who wrote it with 4-Port Switch/VPN Endpoint Software License Agreement c. However, nothing else grants you do not apply to view a copy of the executable. These actions are not ...
User Guide
Page 36
... consistent application of patent infringement or for any version ever published by public license practices. In such case, this Linksys product contains open source software. If the Program specifies a version number of this . Our decision will be guided by copyrighted interfaces, the ...he or she is copyrighted by the Free Software Foundation. If the Program does Broadband Firewall Router with 4-Port Switch/VPN Endpoint Software License Agreement not specify a version number of the section is given a distinguishing version number. For software which applies to it is up to ...
... consistent application of patent infringement or for any version ever published by public license practices. In such case, this Linksys product contains open source software. If the Program specifies a version number of this . Our decision will be guided by copyrighted interfaces, the ...he or she is copyrighted by the Free Software Foundation. If the Program does Broadband Firewall Router with 4-Port Switch/VPN Endpoint Software License Agreement not specify a version number of the section is given a distinguishing version number. For software which applies to it is up to ...
User Guide
Page 37
... the successor of the GNU Library Public License, version 2, hence the version number 2.1.] Preamble The licenses for linking other free software developers Less of the library or if you modify it does ensure that any free program. The Lesser General Public License permits ...that you can use the ordinary General Public License for a version of it ; Broadband Firewall Router with a two-step method: (1) we copyright the library, and (2) we use it too, but changing it . Finally, software patents pose a constant threat to some libraries, is covered by others. Therefore, we...
... the successor of the GNU Library Public License, version 2, hence the version number 2.1.] Preamble The licenses for linking other free software developers Less of the library or if you modify it does ensure that any free program. The Lesser General Public License permits ...that you can use the ordinary General Public License for a version of it ; Broadband Firewall Router with a two-step method: (1) we copyright the library, and (2) we use it too, but changing it . Finally, software patents pose a constant threat to some libraries, is covered by others. Therefore, we...
User Guide
Page 38
... library". GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. The "Library", below, refers to any such software library or work which is covered only if its purpose remains meaningful. (For example, a function in a library to compute square roots ...applies to it. they are not derived from the library, whereas the latter must make a good faith effort to form executables. Broadband Firewall Router with application programs (which contains a notice placed by this License. keep intact all third parties under the terms of the library....
... library". GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. The "Library", below, refers to any such software library or work which is covered only if its purpose remains meaningful. (For example, a function in a library to compute square roots ...applies to it. they are not derived from the library, whereas the latter must make a good faith effort to form executables. Broadband Firewall Router with application programs (which contains a notice placed by this License. keep intact all third parties under the terms of the library....
User Guide
Page 39
...to work written entirely by you wish to work with the Library by law. Broadband Firewall Router with a work based on the Library) on the Library with the Library (or with 4-Port Switch/VPN Endpoint Software License Agreement When a "work that uses the Library" uses material from that... or derivative of it, under Section 2) in these things: a) Accompany the work with the object code. 5. Section 6 states terms for software interchange. If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines...
...to work written entirely by you wish to work with the Library by law. Broadband Firewall Router with a work based on the Library) on the Library with the Library (or with 4-Port Switch/VPN Endpoint Software License Agreement When a "work that uses the Library" uses material from that... or derivative of it, under Section 2) in these things: a) Accompany the work with the object code. 5. Section 6 states terms for software interchange. If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines...
User Guide
Page 40
...License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the free software distribution system which the executable runs, unless that is one , as long as to copy, modify, sublicense, link with , ...have made by this License will automatically terminate your obligations under this License. c) Accompany the work that contradict the conditions of it . Broadband Firewall Router with the Library. You may not copy, modify, sublicense, link with , or distribute the Library is implemented by court order, ...
...License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the free software distribution system which the executable runs, unless that is one , as long as to copy, modify, sublicense, link with , ...have made by this License will automatically terminate your obligations under this License. c) Accompany the work that contradict the conditions of it . Broadband Firewall Router with the Library. You may not copy, modify, sublicense, link with , or distribute the Library is implemented by court order, ...
User Guide
Page 41
... distribution is intended to make exceptions for permission. we sometimes make thoroughly clear what is believed to be similar in this Linksys product contains open source software. EXCEPT WHEN OTHERWISE STATED INWRITINGTHE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY ....com). If you may publish revised and/or new versions of that choice. NO WARRANTY Broadband Firewall Router with these, write to the author to ask for this License. 13. For software which applies to it is up to the author/donor to decide if he or she is...
... distribution is intended to make exceptions for permission. we sometimes make thoroughly clear what is believed to be similar in this Linksys product contains open source software. EXCEPT WHEN OTHERWISE STATED INWRITINGTHE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY ....com). If you may publish revised and/or new versions of that choice. NO WARRANTY Broadband Firewall Router with these, write to the author to ask for this License. 13. For software which applies to it is up to the author/donor to decide if he or she is...
User Guide
Page 42
...provided with the distribution. 3. not just the SSL code. Redistributions of source code must include an acknowledgement: "This product includes software written by Eric Young ([email protected])" The word 'cryptographic' can be called "OpenSSL" nor may "OpenSSL" appear ...source code must reproduce the above copyright notice, this software must display the following disclaimer. 2. LOSS OF USE, DATA, OR PROFITS; Broadband Firewall Router with Netscape's SSL. The following acknowledgment:"This product includes software developed by Eric Young ([email protected]). All ...
...provided with the distribution. 3. not just the SSL code. Redistributions of source code must include an acknowledgement: "This product includes software written by Eric Young ([email protected])" The word 'cryptographic' can be called "OpenSSL" nor may "OpenSSL" appear ...source code must reproduce the above copyright notice, this software must display the following disclaimer. 2. LOSS OF USE, DATA, OR PROFITS; Broadband Firewall Router with Netscape's SSL. The following acknowledgment:"This product includes software developed by Eric Young ([email protected]). All ...
User Guide
Page 43
...WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. i.e. LOSS OF USE, DATA, OR PROFITS; The license and distribution ...be changed. this code cannot be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 4 Software License Agreement Broadband Firewall Router with 4-Port Switch/VPN Endpoint 8111121B-JL 40 Appendix E DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,...
...WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. i.e. LOSS OF USE, DATA, OR PROFITS; The license and distribution ...be changed. this code cannot be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 4 Software License Agreement Broadband Firewall Router with 4-Port Switch/VPN Endpoint 8111121B-JL 40 Appendix E DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,...